• [gentoo-announce] [ GLSA 202310-04 ] libvpx: Multiple Vulnerabilities

    From glsamaker@gentoo.org@21:1/5 to All on Wed Oct 4 13:20:01 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202310-04
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: libvpx: Multiple Vulnerabilities
    Date: October 04, 2023
    Bugs: #914875, #914987
    ID: 202310-04

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in libvpx, the worst of
    which could result in arbitrary code execution.

    Background
    ==========

    libvpx is the VP8 codec SDK used to encode and decode video streams,
    typically within a WebM format media file.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ----------------- ------------ ------------
    media-libs/libvpx < 1.13.1 >= 1.13.1

    Description
    ===========

    Multiple vulnerabilities have been discovered in libvpx. Please review
    the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All libvpx users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-libs/libvpx-1.13.1"

    References
    ==========

    [ 1 ] CVE-2023-5217
    https://nvd.nist.gov/vuln/detail/CVE-2023-5217
    [ 2 ] CVE-2023-44488
    https://nvd.nist.gov/vuln/detail/CVE-2023-44488

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202310-04

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmUdRn8ACgkQFMQkOaVy +9mwww/+N9AmlaCBQ4UdZrhmgOZNhzWOc7ozstW09cJcYbTFXICoJLaGhOKg2AWJ tgns/BnD4l8cXsBWNHfqrlzhKZe5dn89ekUzs0R4IhI0n6qycW7YSGeN1TJqwvk9 YZDer35xBfb5lT3Ch+mNd7GeTUmbdauq1svSUZoJ+9RjXwf79wFVBdmPJA590kEi P9iLbwVMfQX8ekadbxHylcHvq//MN3i+BGQWtEmqj/Go+DTbxPO/wUhmIx+5wiKa zbUcLAjm1TdhSmQG+O4gKHop7jNG9vqXmaGK4dNqSbJQER7+A5/m4mv2/t24352R aZGDhGS42Q4rXUbbgONBL0KSckkQZMePW9c5jsrrZAwTxEhdBNXZ9+MvEiPOmPfG ptcRl0AEPg9aCGmHVIhnygM4GXMcQtsPemGgM6hwuQjVqZHQKLlM479MFAqhqMSN sRo+2TSYUPtxo3t35SC+RFj0XzetxWuN7M2Hm+4++iZehIRFvAqyWYZihnpg5rae IxRJlUJ3lG5pFRXRN2XZVKbZC4HcDnO4n/8s9qh7gEPZvd3K0tTAvdN0uFcDg90R aCRs4OoZVqZz9RFAcWkAG/zZG4DQZMTeKz/D+iNjFBd5cta64McXG0xfU7G1/Fis kXvJtD9b9XgyKs5f/LUoC9+o65k/qM9PR5K6cPY/bAIIXqPJmiU=
    =9VLg
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)